Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 04:39
Static task
static1
Behavioral task
behavioral1
Sample
2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
2aff6bd9dfb80c1ac34180e17ccc9c24
-
SHA1
5a7bac87fe5ffe3c527ee3dbcd8ae7893e33f6f9
-
SHA256
fe4a1fc042da484adda7fdacd0b007025a73df4a836da7411f6082357cdfc684
-
SHA512
d39dbfdc84f395629fb3c179e5a57c7274068beb4d5a0f3bb838c4146544d7da18a3c8331eae2f76e9418606f101f34be1cd10a02907fa3eade16f2efe92050d
-
SSDEEP
49152:Dm1WAZYhMLVOmCmpqb3r6d2TuScfOJSaPCUbRN59yxYc:ifZcOVOm/qrGciSQOJSaP/blkxP
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" explorer.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\\explorer.exe" explorer.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe -
Executes dropped EXE 6 IoCs
pid Process 3408 chml.exe 1624 chml.exe 1808 explorer.exe 3960 chml.exe 1208 chml.exe 1596 explorer.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine explorer.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\\explorer.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\\explorer.exe" explorer.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 1808 explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4956 set thread context of 2200 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 101 PID 1808 set thread context of 1596 1808 explorer.exe 121 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\chml.exe 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Kills process with taskkill 1 IoCs
pid Process 4744 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe 4340 schtasks.exe 2988 schtasks.exe 3108 schtasks.exe 400 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 1808 explorer.exe 1808 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4744 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 2200 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 1808 explorer.exe 1596 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3576 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 86 PID 4956 wrote to memory of 3576 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 86 PID 4956 wrote to memory of 3576 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 86 PID 4956 wrote to memory of 2672 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 88 PID 4956 wrote to memory of 2672 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 88 PID 4956 wrote to memory of 2672 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 88 PID 4956 wrote to memory of 4340 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 90 PID 4956 wrote to memory of 4340 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 90 PID 4956 wrote to memory of 4340 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 90 PID 4956 wrote to memory of 464 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 92 PID 4956 wrote to memory of 464 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 92 PID 4956 wrote to memory of 464 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 92 PID 464 wrote to memory of 1528 464 cmd.exe 94 PID 464 wrote to memory of 1528 464 cmd.exe 94 PID 464 wrote to memory of 1528 464 cmd.exe 94 PID 4692 wrote to memory of 3408 4692 cmd.exe 97 PID 4692 wrote to memory of 3408 4692 cmd.exe 97 PID 4692 wrote to memory of 3408 4692 cmd.exe 97 PID 4692 wrote to memory of 1624 4692 cmd.exe 98 PID 4692 wrote to memory of 1624 4692 cmd.exe 98 PID 4692 wrote to memory of 1624 4692 cmd.exe 98 PID 4956 wrote to memory of 4844 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 99 PID 4956 wrote to memory of 4844 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 99 PID 4956 wrote to memory of 4844 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 99 PID 4956 wrote to memory of 2200 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 101 PID 4956 wrote to memory of 2200 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 101 PID 4956 wrote to memory of 2200 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 101 PID 4956 wrote to memory of 2200 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 101 PID 4956 wrote to memory of 2200 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 101 PID 4956 wrote to memory of 2200 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 101 PID 4956 wrote to memory of 2200 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 101 PID 4956 wrote to memory of 2200 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 101 PID 4956 wrote to memory of 2200 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 101 PID 4956 wrote to memory of 3920 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 102 PID 4956 wrote to memory of 3920 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 102 PID 4956 wrote to memory of 3920 4956 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 102 PID 2200 wrote to memory of 1808 2200 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 105 PID 2200 wrote to memory of 1808 2200 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 105 PID 2200 wrote to memory of 1808 2200 2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe 105 PID 1808 wrote to memory of 580 1808 explorer.exe 106 PID 1808 wrote to memory of 580 1808 explorer.exe 106 PID 1808 wrote to memory of 580 1808 explorer.exe 106 PID 1808 wrote to memory of 2988 1808 explorer.exe 108 PID 1808 wrote to memory of 2988 1808 explorer.exe 108 PID 1808 wrote to memory of 2988 1808 explorer.exe 108 PID 1808 wrote to memory of 3108 1808 explorer.exe 110 PID 1808 wrote to memory of 3108 1808 explorer.exe 110 PID 1808 wrote to memory of 3108 1808 explorer.exe 110 PID 1808 wrote to memory of 1728 1808 explorer.exe 112 PID 1808 wrote to memory of 1728 1808 explorer.exe 112 PID 1808 wrote to memory of 1728 1808 explorer.exe 112 PID 1728 wrote to memory of 2572 1728 cmd.exe 114 PID 1728 wrote to memory of 2572 1728 cmd.exe 114 PID 1728 wrote to memory of 2572 1728 cmd.exe 114 PID 5096 wrote to memory of 3960 5096 cmd.exe 117 PID 5096 wrote to memory of 3960 5096 cmd.exe 117 PID 5096 wrote to memory of 3960 5096 cmd.exe 117 PID 5096 wrote to memory of 1208 5096 cmd.exe 118 PID 5096 wrote to memory of 1208 5096 cmd.exe 118 PID 5096 wrote to memory of 1208 5096 cmd.exe 118 PID 1808 wrote to memory of 4668 1808 explorer.exe 119 PID 1808 wrote to memory of 4668 1808 explorer.exe 119 PID 1808 wrote to memory of 4668 1808 explorer.exe 119 PID 1808 wrote to memory of 1596 1808 explorer.exe 121 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED" /v EnableBalloonTips /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /TN tmp7445 /TR "'C:\Users\Admin\AppData\Roaming\{TKPT-J8CU-U77L-YU2M-UMTD-9JWL}\tmp7445.exe' /Installed" /sc ONLOGON /RL HIGHEST /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2672
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /RU SYSTEM /TN Protect /TR "'C:\Users\Admin\AppData\Local\Temp\Protect.bat' " /sc once /ST 00:00:00 /RL HIGHEST /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4340
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks /Run /TN Protect2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /TN Protect3⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /TN Protect /f2⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\2aff6bd9dfb80c1ac34180e17ccc9c24_JaffaCakes118.exe/Installed2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Roaming\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\explorer.exeC:\Users\Admin\AppData\Roaming\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\explorer.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED" /v EnableBalloonTips /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /TN tmp7445 /TR "'C:\Users\Admin\AppData\Roaming\{TKPT-J8CU-U77L-YU2M-UMTD-9JWL}\tmp7445.exe' /Installed" /sc ONLOGON /RL HIGHEST /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2988
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /RU SYSTEM /TN Protect /TR "'C:\Users\Admin\AppData\Local\Temp\Protect.bat' " /sc once /ST 00:00:00 /RL HIGHEST /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3108
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks /Run /TN Protect4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /TN Protect5⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /TN Protect /f4⤵
- System Location Discovery: System Language Discovery
PID:4668
-
-
C:\Users\Admin\AppData\Roaming\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\explorer.exe/Installed4⤵
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM wscript.exe /F5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc ONLOGON /tn explorer.exe /tr "C:\Users\Admin\AppData\Roaming\com6.{00C6D95F-329C-409a-81D7-C46C66EA7F33}\explorer.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:400
-
-
-
C:\Windows\SysWOW64\setx.exesetx.exe ProgramData "C:\ProgramData"4⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1CCF75FF.cmd3⤵
- System Location Discovery: System Language Discovery
PID:3212
-
-
-
C:\Windows\SysWOW64\setx.exesetx.exe ProgramData "C:\ProgramData"2⤵
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Protect.bat""1⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\chml.exeC:\Windows\chml.exe "C:\Users\Admin\AppData\Roaming\{TKPT-J8CU-U77L-YU2M-UMTD-9JWL}" -pass2 -ps:S:(ML;OICI;NRNXNW;;;SI)2⤵
- Executes dropped EXE
PID:3408
-
-
C:\Windows\chml.exeC:\Windows\chml.exe "C:\Users\Admin\AppData\Roaming\{TKPT-J8CU-U77L-YU2M-UMTD-9JWL}\tmp7445.exe" -pass2 -ps:S:(ML;OICI;NW;;;SI)2⤵
- Executes dropped EXE
PID:1624
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Protect.bat""1⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\chml.exeC:\Windows\chml.exe "C:\Users\Admin\AppData\Roaming\{TKPT-J8CU-U77L-YU2M-UMTD-9JWL}" -pass2 -ps:S:(ML;OICI;NRNXNW;;;SI)2⤵
- Executes dropped EXE
PID:3960
-
-
C:\Windows\chml.exeC:\Windows\chml.exe "C:\Users\Admin\AppData\Roaming\{TKPT-J8CU-U77L-YU2M-UMTD-9JWL}\tmp7445.exe" -pass2 -ps:S:(ML;OICI;NW;;;SI)2⤵
- Executes dropped EXE
PID:1208
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b436d0313cdc3e0c41e34d2eeaa89aa4
SHA1cb3061cee5d0d241157aaa88716e2afb3375ceac
SHA25688899650d21178a9e7e33cd80f8fe785ebda4e12665686849d005e46872fe690
SHA5120f5c38b3fcbe364efd3f3cc7e875b078231823e4082a0cd418030510c4068874ac1b12406a9e2001694e0cbb210ea58453968be2f65f5128fb9bc11ef134d51e
-
Filesize
250B
MD5737fdb77319495d782d19417702695dd
SHA10392e20eb1879015f4b3272b1341ccb3dc5ddf67
SHA256e905293f5107b8d65ed307e233c70ad2153db021099176d21c96649603550d5d
SHA51277d396d56c025262ec8fff0841003237e1c30abf10c59e02322854dc4853f957bba671c86112fe38fb86087bb7802ec5c3b65601828b577d8b844bc1f9c3f8a6
-
Filesize
1.9MB
MD52aff6bd9dfb80c1ac34180e17ccc9c24
SHA15a7bac87fe5ffe3c527ee3dbcd8ae7893e33f6f9
SHA256fe4a1fc042da484adda7fdacd0b007025a73df4a836da7411f6082357cdfc684
SHA512d39dbfdc84f395629fb3c179e5a57c7274068beb4d5a0f3bb838c4146544d7da18a3c8331eae2f76e9418606f101f34be1cd10a02907fa3eade16f2efe92050d
-
Filesize
105KB
MD530586ce612dc86ad2795a8de7a114754
SHA1e26af472a52039caac5548ecb3c6727b2651e490
SHA25659aa55d2eac6b295d42ef2aadc607b759f034f4557a66dec0214a4cc032ecc17
SHA512a22317552f90e896fb6f0e4a30f7834baf97a771211a37aca12f52d55ff8b85212d4ded5138ab66a70eaaa1193002b98158938bc17185ea94ccc9f7f4b8120f4